CN105607938B - Security application interface elements configuration method - Google Patents

Security application interface elements configuration method Download PDF

Info

Publication number
CN105607938B
CN105607938B CN201511009485.1A CN201511009485A CN105607938B CN 105607938 B CN105607938 B CN 105607938B CN 201511009485 A CN201511009485 A CN 201511009485A CN 105607938 B CN105607938 B CN 105607938B
Authority
CN
China
Prior art keywords
security
security application
interface elements
configuration method
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511009485.1A
Other languages
Chinese (zh)
Other versions
CN105607938A (en
Inventor
陈成超
冀乃庚
傅宜生
田丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201511009485.1A priority Critical patent/CN105607938B/en
Publication of CN105607938A publication Critical patent/CN105607938A/en
Application granted granted Critical
Publication of CN105607938B publication Critical patent/CN105607938B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention proposes security application interface elements configuration method, the method includes:For the different third party's clients buildings run on the user terminal with credible performing environment respectively from the associated element allocation models of different security applications and be stored in database;Third party's client selection target security application and credible performing environment manager into user terminal sends element acquisition request according to user instructions;Credible performing environment manager is inquired with selected targeted security from database using associated element allocation models, and is obtained response based on the element allocation models establishing element inquired and element acquisition response is sent back third party's client and allow it to present with selected targeted security to user using associated element.Security application interface elements configuration method disclosed in this invention has high configuration flexibility and good compatibility.

Description

Security application interface elements configuration method
Technical field
The present invention relates to interface elements configuration methods, more particularly, to security application interface elements configuration method.
Background technique
Currently, increasingly extensive and different field the type of business applied with computer and networks becomes increasingly abundant, It is running on credible performing environment(TSM)User terminal(Such as mobile terminal)On third party's client on needle is presented To different security applications(Such as the payment application in financial field)Distinct interface element(Such as interface elements)Combination becomes It obtains more and more important.
In existing technical solution, configures and manage typically with the following two kinds mode and answered for different safeties Interface elements are presented:(1) in the first way, use the mode of customization ecosystem APP in advance for different clients End and interface provide specific interface elements;(2)In the second way, using the side of the page encapsulation based on HTML5 agreement Method, nesting HTML5 page configuration and management are for different clients and the special interface element at interface in interface chamber.
However, there are the following problems for above-mentioned existing technical solution:(1)For first way, due to the mode of customization Lack flexibility, therefore needs to update client release when interface elements need to adjust, therefore complicated for operation;(2)For Two kinds of modes are locally stored calling and local file access due to that can not realize, therefore have limitation functionally, and Need to occupy more system resource.
Accordingly, there exist following demands:There is provided, there is the flexibility of configuration and the security application of good compatibility to connect Mouth element configuring method.
Summary of the invention
In order to solve the problems existing in the prior art scheme, the invention proposes have configuration flexibility and The security application interface elements configuration method of good compatibility.
The purpose of the present invention is what is be achieved through the following technical solutions:
A kind of security application interface elements configuration method, the security application interface elements configuration method includes following Step:
(A1)For the different third party's client buildings point run on the user terminal with credible performing environment Not from the associated element allocation models of different security applications and be stored in database;
(A2)Third party's client selection target security application and into the user terminal according to user instructions Credible performing environment manager send element acquisition request;
(A3)The credible performing environment manager is looked into from the database after receiving the element acquisition request It askes and applies associated element allocation models with selected targeted security, and based on the element allocation models building inquired Element obtains response and element acquisition response is sent back third party's client and allows it to present to user Associated element is applied with selected targeted security.
In scheme disclosed above, it is preferable that the element allocation models includes element, the member comprising several elements Plain group and the element group policy comprising several element groups, wherein the element is for the most basic of specific security application Element, the element group indicates corresponding with the particular community of business provided by security application or function several respectively The set of element, the element group policy is the set of several element groups, with the identifier of security application and the safety It is corresponded using the type of provided business.
In scheme disclosed above, it is preferable that the element acquisition request include and selected targeted security Using the identifier of associated element group policy, the identifier is set in advance in described by third party client provider In tripartite's client.
In scheme disclosed above, it is preferable that the credible performing environment manager is obtained receiving the element The element group policy according to included in the element acquisition request after request is taken to indicate clothes inquiry and institute from the database The targeted security of selection applies associated element allocation models, and parse the element in the element allocation models that inquires and Element group is obtained in response message with being assembled to element.
In scheme disclosed above, it is preferable that described to apply associated element with selected targeted security Allocation models defines user interface or pop-up formula prompt information for executing specific function.
In scheme disclosed above, it is preferable that described to apply associated element with selected targeted security Allocation models definition application is recommended, and the application recommendation includes text envelope relevant to the display of security application to be recommended One or more of breath, footmark, brightness, size, color.
In scheme disclosed above, it is preferable that the step(A3)Further comprise:It is obtained receiving the element After taking response, third party's client applies associated element allocation models dynamic according to selected targeted security Ground generates user interface and applies associated element with selected targeted security to present to user.
In scheme disclosed above, it is preferable that verification is answered with selected targeted security one of as follows With the legitimacy of associated element:(1)Third party's client is based on the verification of scheduled checking algorithm and selected mesh Mark the legitimacy of the associated element of security application;(2)The credible performing environment manager is verified using background server The legitimacy of associated element is applied with selected targeted security;(3)Third party's client credible is held with described Row environment manager verifies the legitimacy that associated element is applied with selected targeted security with being combined, i.e., and described the Simple verification early period of tripartite's client executing, the credible performing environment manager execute complicated later period verification.
In scheme disclosed above, it is preferable that any element allocation models stored in the database can be by It is freely set according to actual needs, to neatly change the presentation of element associated with any security application.
Security application interface elements configuration method disclosed in this invention has the following advantages that:It is flexible with high configuration Property and good compatibility and scalability, and occupy less system resource.
Detailed description of the invention
In conjunction with attached drawing, technical characteristic of the invention and advantage will be more fully understood by those skilled in the art, wherein:
Fig. 1 is the flow chart of the security application interface elements configuration method of embodiment according to the present invention.
Specific embodiment
Fig. 1 is the flow chart of the security application interface elements configuration method of embodiment according to the present invention.Such as Fig. 1 institute Show, security application interface elements configuration method disclosed in this invention includes the following steps:(A1)For run on have can Believe the user terminal of performing environment(Such as mobile terminal)On different third party's clients buildings respectively from different safety Property using associated element allocation models and being stored in database;(A2)Third party's client refers to according to user It enables selection target security application and the credible performing environment manager into the user terminal sends element acquisition request; (A3)The credible performing environment manager after receiving the element acquisition request from the database inquiry with it is selected The targeted security selected applies associated element allocation models, and is obtained based on the element allocation models establishing element inquired Response and by the element acquisition response send back third party's client allow it to user present with it is selected Targeted security apply associated element.
Preferably, in security application interface elements configuration method disclosed in this invention, the element allocation models Including element, the element group comprising several elements and the element group policy comprising several element groups, wherein the element is needle To the most basic element of specific security application(Such as each element may include one or more of fields:Word Name section(The title shown for client end interface), field label(Identification and binding for client to element), prompt Information(The official documents and correspondence information prompted when corresponding to client trigger action), the page initialization when state(When indicating page initialization Whether the element is presented on the page)Etc.), the element group indicates specific with business provided by security application respectively The set of attribute or the corresponding several elements of function(For example, for the payment application in financial field, the element group can be with It is one or more of following:Holder's identity information group(It includes holder's identity-related information, such as holder's surname Name, type of credential, passport NO., cell-phone number, identifying code etc.), debit account information group(It includes debit card card number and passwords Information), credit account information group(It includes credit card card number, cvn2 and validity period information)And general information group(It includes The banks such as electronic cash particular attribute)), the element group policy is the set of several element groups, the mark with security application The type for knowing business provided by symbol and the security application corresponds.
Preferably, in security application interface elements configuration method disclosed in this invention.The element acquisition request Identifier comprising applying associated element group policy with selected targeted security, the identifier is by third party client End provider is set in advance in third party's client.
Preferably, in security application interface elements configuration method disclosed in this invention, the credible performing environment Manager element group policy according to included in the element acquisition request after receiving the element acquisition request indicates Clothes are inquired from the database applies associated element allocation models with selected targeted security, and parses and inquire Element allocation models in element and element group be assembled to element obtain response message in.
Preferably, in security application interface elements configuration method disclosed in this invention, described and selected mesh The mark associated element allocation models of security application defines user interface or the prompt of pop-up formula for executing specific function Information.
Preferably, in security application interface elements configuration method disclosed in this invention, described and selected mesh It marks the associated element allocation models definition application of security application to recommend, the application recommendation includes and safety to be recommended One or more of the relevant text information of the display of application, footmark, brightness, size, color(Specific application is promoted to arrange Sequence in table, and some special efficacys are added, give user eye-catching visual effect).
Preferably, in security application interface elements configuration method disclosed in this invention, the step(A3)Into one Step includes:After receiving the element and obtaining response, third party's client is answered according to selected targeted security User interface is dynamically generated with associated element allocation models to present and selected targeted security application to user Associated element.
Preferably, in security application interface elements configuration method disclosed in this invention, one of as follows school Test the legitimacy that associated element is applied with selected targeted security:(1)Third party's client is based on scheduled The legitimacy of associated element is applied in checking algorithm verification with selected targeted security(Such as data format or length, The verification of data type);(2)The credible performing environment manager utilizes background server verification and selected targeted security Property apply associated element legitimacy(Such as service logic verification);(3)Third party's client credible is held with described Row environment manager verifies the legitimacy that associated element is applied with selected targeted security with being combined, i.e., and described the Simple verification early period of tripartite's client executing, the credible performing environment manager execute complicated later period verification(Such as gold Melt the bank card card bin verification in field, bank card borrows or lends money attribute verification, regular expression verification etc.).
Preferably, it in security application interface elements configuration method disclosed in this invention, is stored in the database Any element allocation models can be freely set according to actual needs, thus neatly change with any safety Using the presentation of associated element.
Therefore security application interface elements configuration method disclosed in this invention has following advantages:With height Configuration flexibility and good compatibility and scalability, and occupy less system resource.
Although the present invention is described by above-mentioned preferred embodiment, way of realization is not limited to Above-mentioned embodiment.It should be realized that:In the case where not departing from spirit and scope of the present invention, those skilled in the art can be with Different change and modification are made to the present invention.

Claims (9)

1. a kind of security application interface elements configuration method, the security application interface elements configuration method includes following step Suddenly:
(A1)For the different third party's clients buildings run on the user terminal with credible performing environment respectively with The associated element allocation models of different security applications is simultaneously stored in database;
(A2)Third party's client according to user instructions selection target security application and into the user terminal can Believe that performing environment manager sends element acquisition request;
(A3)The credible performing environment manager after receiving the element acquisition request from the database inquiry with Selected targeted security applies associated element allocation models, and based on the element allocation models establishing element inquired It obtains response and element acquisition response is sent back into third party's client and allow it to user's presentation and institute The targeted security of selection applies associated element.
2. security application interface elements configuration method according to claim 1, which is characterized in that the element configures mould Type includes element, the element group comprising several elements and the element group policy comprising several element groups, wherein the element is For the most basic element of specific security application, the element group indicate respectively with business provided by security application The set of particular community or the corresponding several elements of function, the element group policy is the set of several element groups, with peace The combination of the type of business provided by the identifier of full property application and the security application corresponds.
3. security application interface elements configuration method according to claim 2, which is characterized in that the element acquisition is asked The identifier comprising applying associated element group policy with selected targeted security is sought, the identifier is by third party visitor Family end provider is set in advance in third party's client.
4. security application interface elements configuration method according to claim 3, which is characterized in that the credible execution ring Border manager element group policy table according to included in the element acquisition request after receiving the element acquisition request Show that clothes are inquired from the database with selected targeted security using associated element allocation models, and parses inquiry Element in element allocation models and element group out is obtained in response message with being assembled to element.
5. security application interface elements configuration method according to claim 4, which is characterized in that it is described with it is selected Targeted security defines user interface for executing specific function using associated element allocation models or pop-up formula mentions Show information.
6. security application interface elements configuration method according to claim 5, which is characterized in that it is described with it is selected Targeted security is recommended using the definition application of associated element allocation models, and the application recommendation includes and safety to be recommended Property application the relevant text information of display, footmark, brightness, size, one or more of color.
7. security application interface elements configuration method according to claim 6, which is characterized in that the step(A3)Into One step includes:After receiving the element and obtaining response, third party's client according to selected targeted security User interface is dynamically generated using associated element allocation models to answer to present to user with selected targeted security With associated element.
One of 8. security application interface elements configuration method according to claim 7, which is characterized in that as follows Verify the legitimacy that associated element is applied with selected targeted security:(1)Third party's client is based on predetermined Checking algorithm verification with selected targeted security using associated element legitimacy;(2)The credible execution ring Border manager verifies the legitimacy that associated element is applied with selected targeted security using background server;(3)Institute Third party's client is stated to verify with being combined and selected targeted security application phase with the credible performing environment manager The legitimacy of associated element, wherein simple verification early period of third party's client executing, the credible performing environment pipe It manages device and executes complicated later period verification.
9. security application interface elements configuration method according to claim 8, which is characterized in that deposited in the database Any element allocation models of storage can be freely set according to actual needs, to neatly change and any safety Property apply associated element presentation.
CN201511009485.1A 2015-12-30 2015-12-30 Security application interface elements configuration method Active CN105607938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511009485.1A CN105607938B (en) 2015-12-30 2015-12-30 Security application interface elements configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511009485.1A CN105607938B (en) 2015-12-30 2015-12-30 Security application interface elements configuration method

Publications (2)

Publication Number Publication Date
CN105607938A CN105607938A (en) 2016-05-25
CN105607938B true CN105607938B (en) 2018-11-27

Family

ID=55987892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511009485.1A Active CN105607938B (en) 2015-12-30 2015-12-30 Security application interface elements configuration method

Country Status (1)

Country Link
CN (1) CN105607938B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169762B (en) * 2017-05-24 2020-02-07 中国银联股份有限公司 Configuration method and device of security carrier
CN110083839B (en) * 2019-04-29 2023-08-22 珠海豹好玩科技有限公司 Text importing method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6110229A (en) * 1997-02-21 2000-08-29 International Intelligent Information Co., Ltd. User environment transfer system of information apparatus
CN103516666A (en) * 2012-06-20 2014-01-15 中国银联股份有限公司 Safety information interaction device and method
CN104111828A (en) * 2013-04-22 2014-10-22 易保网络技术(上海)有限公司 Automatic generation method and system of human-computer interaction interface

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6110229A (en) * 1997-02-21 2000-08-29 International Intelligent Information Co., Ltd. User environment transfer system of information apparatus
CN103516666A (en) * 2012-06-20 2014-01-15 中国银联股份有限公司 Safety information interaction device and method
CN104111828A (en) * 2013-04-22 2014-10-22 易保网络技术(上海)有限公司 Automatic generation method and system of human-computer interaction interface

Also Published As

Publication number Publication date
CN105607938A (en) 2016-05-25

Similar Documents

Publication Publication Date Title
TWI717728B (en) Identity verification and login method, device and computer equipment
US9047462B2 (en) Computer account management system and realizing method thereof
CN104796257B (en) Flexible data authentication
CN105554146B (en) A kind of remote access method and device
US8943124B2 (en) Systems and methods for customizing mobile applications based upon user associations with one or more entities
CN103593773A (en) Product anti-fake method and system and client terminal
CN104158889B (en) Card information querying method and Cloud Server
CN102171712A (en) Identity and authentication system using aliases
CN106357699A (en) Network system, service platform and login method and system of service platform
CN110826043A (en) Digital identity application system and method, identity authentication system and method
CN104125203A (en) Permission management method and system
CN103369038B (en) Platform serves PaaS management platform and method
CN102215237A (en) Implementation method for grade-based passive registered real-name alumni service
US9274669B1 (en) Customizing user interfaces for multiple different clients
CN109118291B (en) User authentication method and device in advertisement task popularization and computer equipment
US11968538B1 (en) Access controlling network architectures and systems, having cellular network components and elements modified to host access controlling schemas designed to transform and/or facilitate cellular communication signals in accordance with novel cellular communications protocols with multi-part multi-functional address signaling, and methods for use thereof
CN106415591A (en) Electronic device, system and method for nfc
CN108650098A (en) The method and device of User Defined verification mode
CN105607938B (en) Security application interface elements configuration method
CN106664535B (en) A kind of method for sending information, device, terminal device and system
CN112669157A (en) Transaction method, device and system based on block chain and readable storage medium
CN109104368A (en) A kind of request connection method, device, server and computer readable storage medium
CN108390848A (en) A kind of information witness method and device
CN103415847A (en) A system and method for accessing a service
CN106657112A (en) Authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant